Exploit the contract and extract the 0.05 ether. There’s also a 100 DAIbounty up for grabs. The rules for winning the bounty are the same as last time:

If you’re first to extract the ETH and post a write-up on how you did it, you win the bounty (you will need to prove ownership of the attacker’s address — with this contract, if you are not careful, it is possible to send the ETH to an address that you do not control)

If you’re not first to extract the ETH but solved the challenge, you can still post a write-up. In case the original thief does not claim the bounty, we will pick the best write-up as the winner.

If you have any questions, head to the MythX Discord. Good luck and have fun!

UPDATE

Congratulations to samczsun for solving this challenge as well! Take a look at his fantastic writeup. Or extract the creation bytecode and continue to solve without the promise of a prize!